[SecondaryNavigationDezeHoofdRubriekBevat](EN) 0 [SecondaryNavigationRubrieken](EN):
45 document(s) found.
The referral term "Online crime" is replaced with "Computer crime".
You searched for web pages: "Computer crime" and/or "Hacking" and/or "Computer fraud" and/or "Computer virus" and/or "Spamming" and/or "Hostage software"
Legal aspects of algorithmic decision-making. An exploratory study; An exploratory study (full text only available in Dutch)
In our daily lives we all encounter decisions that are made with the help of algorithms. The use of algorithms creates...
Spying with hobby-drones and other technologies by citizens; (full text only available in Dutch)
Spy products such as miniature cameras, eavesdropping devices and location trackers enable citizens to spy on, that is...
Internet sources in the Netherlands
Study into increased mobility and changes in crime; (full text only available in Dutch)
Even though the police’s workload is infinite, the police’s capacity is limited. Hence, it should carefully be distributed...
Cyber offenders: profiles and interventions; (full text only available in Dutch)
This research attempted to generate more systematic knowledge about the characteristics and profiles of juvenile and adult...
How safely do we behave online?; A study of the relationship between knowledge, opportunity, motivation and the online behaviour of Dutch citizens (full text only available in Dutch)
Knowledge about how citizens behave online and how they (might) defend themselves against online crime is scarce. To date, it...
Online victimization - prevalence, risk factors and consequences; (full text only available in Dutch)
Online crime victimization has become one of the major challenges in our digitalized society. Almost everybody is connected...
Cybersecurity; A state-of-the-art review
The NCTV (Nationaal Coördinator Terrorismebestrijding en Veiligheid – ‘National Coordinator for Security and...
Online discoverability and vulnerabilities of ICS/SCADA devices in the Netherlands
On a regular basis we read in the news about cyber attacks on critical infrastructures, such as power plants. Such...
Process evaluation pilot Halt-intervention sexting; (full text only available in Dutch)
The purpose of this research is to determine whether the newly developed Halt-intervention sexting is carried out as intended...
Search on related keywords of 'Computer crime'
Basic Inter-term relationships
- SN Clarifying the meaning or definition of the use of a term
- USE Preferred Term
- UF Non-preferred term
- BT Hierarchical higher term
- NT Hierarchical lower term
- RT Associative term